REQ-2015-0617-MNT_CR_TS - FTP

advertisement

Doc# 726969130

Change Request

1

CHANGE REQUEST

REQ#18

Meeting:*

Source:*

Phil Hawkes, Qualcomm, phawkes@qti.qualcomm.com

Wolfgang Granzow, Qualcomm, wgranzow@qti.qualcomm.com

Josef Blanz, Qualcomm, jblanz@qti.qualcomm.com

Date:*

2015-07-21

Contact:*

As above

Reason for Change/s:*

SER-020 and SER-021 address credential provisioning,

and are listed as

“Implemented in Rel-1”. However, regarding remote provisioning,

Rel-1 addresses remote provisioning of symmetric key credentials only– and this is not currently clear from the text. This CR adds a note to clarify what has been implemented regarding credential provisioning.

CR against: Release*

Release 1

CR against: WI*

Active <Work Item number>

MNT Maintenace / < Work Item number(optional)>

STE Small Technical Enhancements / < Work Item number (optional)>

Only ONE of the above shall be ticked

CR against: TS/TR*

TS-0002 v 1.0.1

Clauses/Sub Clauses*

6.4

Type of change: *

Editorial change

Bug Fix or Correction

Change to existing feature or functionality

New feature or functionality

Only ONE of the above shall be ticked

Post Freeze checking:*

This CR contains only essential changes and corrections? YES NO

This CR may break backwards compatibility with the last approved version of the TS? YES

NO

This CR is a mirror CR? YES if YES, please indicate the document number of the original CR: <Document Number) : NO

Template Version:27 May 2015 (Dot not modify)

©

2020 oneM2M Partners Page 1 (of 3)

7

8

9

10

2

3

4

5

6

11

12

13

Doc# 726969130

Change Request oneM2M Notice

The document to which this cover statement is attached is submitted to oneM2M. Participation in, or attendance at, any activity of oneM2M, constitutes acceptance of and agreement to be bound by terms of the Working Procedures and the

Partnership Agreement, including the Intellectual Property Rights (IPR) Principles Governing oneM2M Work found in

Annex 1 of the Partnership Agreement.

Introduction

SER-020 and SER-021 address credential provisioning, and are listed as “Implemented in Rel-1”. However, regarding remote provisioning, Rel-1 addresses remote provisioning of symmetric key credentials only– and this is not currently clear from the text. This CR adds a note to clarify what has been implemented regarding credential provisioning.

-----------------------Start of change 1-------------------------------------------

6.4 Security Requirements

Table 1: Security Requirements

Requirement ID

SER-001

SER-002

SER-003

SER-004

SER-005

SER-006

SER-007

SER-008

SER-009

SER-010

SER-011

SER-012

Description

The oneM2M System shall incorporate protection against threats to its availability such as Denial of Service attacks.

The oneM2M System shall be able to ensure the confidentiality of data.

The oneM2M System shall be able to ensure the integrity of data.

In case where the M2M Devices support USIM/UICC and the Underlying

Networks support network layer security, the oneM2M System shall be able to leverage device ’s USIM / UICC credentials and network’s security capability e.g. 3GPP GBA for establishing the M2M Services and Applications level security through interfaces to Underlying Network.

In case where the M2M Devices support USIM/UICC and the Underlying

Networks support network layer security, and when the oneM2M System is aware of Underlying Network ’s bootstrapping capability e.g. 3GPP GBA, the oneM2M System shall be able to expose this capability to M2M Services and

Applications through API.

In case where the M2M Devices support USIM / UICC and the Underlying

Networks support network layer security, the oneM2M System shall be able to leverage device

’s USIM / UICC credentials when available to bootstrap M2M security association.

When some of the components of an M2M Solution are not available (e.g. WAN connection lost), the oneM2M System shall be able to support the confidentiality and the integrity of data between authorized components of the

M2M Solution that are available.

The oneM2M System shall support countermeasures against unauthorized access to M2M Services and M2M Application Services.

The oneM2M System shall be able to support mutual authentication for interaction with Underlying Networks, M2M Services and M2M Application

Services.

The oneM2M System shall be able to support mechanisms for protection against misuse, cloning, substitution or theft of security credentials.

The oneM2M System shall protect the use of the identity of an M2M

Stakeholder within the oneM2M System against discovery and misuse by other stakeholders.

The oneM2M System shall be able to support countermeasures against

Impersonation attacks and Replay attacks.

Release

Partly

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Implemented in Rel-1

Partly implemented in Rel-1

(see note 3)

©

2020 oneM2M Partners Page 2 (of 3)

14

15

Doc# 726969130

Change Request

Requirement ID

SER-013

SER-014

SER-015

Description

The oneM2M System shall be able to provide the mechanism for integritychecking on boot, periodically on run-time, and on software upgrades for software/hardware/firmware component(s) on M2M Device(s).

The oneM2M System shall be able to provide configuration data to an authenticated and authorized M2M Application in the M2M Gateway/Device.

The oneM2M System shall be able to support mechanisms to provide

Subscriber identity to authorized and authenticated M2M Applications when the oneM2M System has the Subscriber ’s consent.

Release

Not implemented in Rel-1

Implemented in Rel-1

Partly implemented in Rel-1

SER-016

SER-017

SER-018

SER-019

The oneM2M System shall be able to support non repudiation within the M2M service layer and in its authorized interactions with the network and application layers.

The oneM2M System shall be able to mitigate threats identified in oneM2M TR-0008 [

Ошибка! Источник ссылки не найден.

] .

The oneM2M System shall enable an M2M Stakeholder to use a resource or service and be accountable for that use without exposing its identity to other stakeholders.

The oneM2M System shall be able to use service-level credentials present inside the M2M device for establishing the M2M Services and Applications level security.

The oneM2M System shall enable legitimate M2M Service Providers to provision their own credentials into the M2M Devices/Gateways.

(see note 4)

Implemented in Rel-1

Implemented in Rel-1

Partly implemented in Rel-1

Implemented in Rel-1

SER-020

SER-021 The oneM2M System shall be able to remotely and securely provision M2M security credentials in M2M Devices and/or M2M Gateways.

Implemented in Rel-1

(see note 5)

Implemented in Rel-1

(see note 5)

Implemented in Rel-1

SER-022 The oneM2M System shall enable M2M Application Service Providers to authorize interactions involving their M2M Applications on supporting entities

(e.g. Devices/ Gateways/ Service infrastructure).

SER-023 Where a Hardware Security Module (HSM) is supported, the oneM2M System shall be able torely onthe HSM to provide local security.

Partly implemented in Rel-1

Partly SER-024 The oneM2M System shall enable M2M Applications to use different and segregated security environments. implemented in Rel-1

Partly SER-025 The oneM2M System shall be able to prevent unauthorized M2M Stakeholders from identifying and/or observing the actions of other M2M Stakeholders in the oneM2M System, e.g. access to resources and services (see note 1). implemented in Rel-1

SER-026 The oneM2M System shall be able to provide mechanism for the protection of confidentiality of the geographical location information (see note 2).

Implemented in Rel-1

NOTE 1: The above requirement does not cover items outside of the oneM2M System, e.g. Underlying

Networks.

NOTE 2: Geographical location information can be more than simply longitude and latitude.

NOTE 3: Partly supported for Impersonation attacks not supported for Replay attacks.

NOTE 4: The oneM2M System has no means to verify a subscriber’s consent. This requirement is only fulfillable at application level.

NOTE 5: Regarding remote provisioning, Release 1 supports remote provisioning of symmetric key credentials only.

-----------------------End of change 1---------------------------------------------

©

2020 oneM2M Partners Page 3 (of 3)

Download